Suppr超能文献

基于椭圆曲线密码体制的物联网可证明安全匿名认证与密钥协商方案的安全性评估

Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT.

作者信息

Park Kisung, Kim Myeonghyun, Park Youngho

机构信息

Department of Computer Engineering (Smart Security), Gachon University, Seongnam 13120, Republic of Korea.

System Security Research Section, Electronics and Telecommunications Research Institute, Daejeon 34129, Republic of Korea.

出版信息

Sensors (Basel). 2025 Jan 3;25(1):237. doi: 10.3390/s25010237.

Abstract

The proliferation of the Internet of Things (IoT) has worsened the challenge of maintaining data and user privacy. IoT end devices, often deployed in unsupervised environments and connected to open networks, are susceptible to physical tampering and various other security attacks. Thus, robust, efficient authentication and key agreement (AKA) protocols are essential to protect data privacy during exchanges between end devices and servers. The previous work in "Provably Secure ECC-Based Anonymous Authentication and Key Agreement for IoT" proposed a novel AKA scheme for secure IoT environments. They claimed their protocol offers comprehensive security features, guarding against numerous potential flaws while achieving session key security. However, this paper demonstrates through logical and mathematical analyses that the previous work is vulnerable to various attacks. We conducted a security analysis using the extended Canetti and Krawczyk (eCK) model, which is widely employed in security evaluations. This model considers scenarios where an attacker has complete control over the network, including the ability to intercept, modify, and delete messages, while also accounting for the potential exposure of ephemeral private keys. Furthermore, we show that their scheme fails to meet critical security requirements and relies on flawed security assumptions. We prove our findings using the automated validation of internet security protocols and applications, a widely recognized formal verification tool. To strengthen attack resilience, we propose several recommendations for the advancement of more robust and efficient AKA protocols specifically designed for IoT environments.

摘要

物联网(IoT)的激增加剧了维护数据和用户隐私的挑战。物联网终端设备通常部署在无人监管的环境中并连接到开放网络,容易受到物理篡改和各种其他安全攻击。因此,强大、高效的认证和密钥协商(AKA)协议对于保护终端设备与服务器之间交换数据时的数据隐私至关重要。之前发表在《用于物联网的基于椭圆曲线密码体制的可证明安全的匿名认证和密钥协商》中的工作提出了一种适用于安全物联网环境的新颖AKA方案。他们声称其协议具备全面的安全特性,能防范众多潜在缺陷,同时实现会话密钥安全。然而,本文通过逻辑和数学分析表明,先前的工作容易受到各种攻击。我们使用广泛应用于安全评估的扩展卡内蒂和克劳奇克(eCK)模型进行了安全分析。该模型考虑了攻击者完全控制网络的场景,包括拦截、修改和删除消息的能力,同时还考虑了临时私钥可能暴露的情况。此外,我们表明他们的方案未能满足关键安全要求,并且依赖有缺陷的安全假设。我们使用互联网安全协议和应用的自动验证(一种广受认可的形式验证工具)证明了我们的发现。为了增强抗攻击能力,我们针对专门为物联网环境设计的更强大、高效的AKA协议的发展提出了若干建议。

文献AI研究员

20分钟写一篇综述,助力文献阅读效率提升50倍。

立即体验

用中文搜PubMed

大模型驱动的PubMed中文搜索引擎

马上搜索

文档翻译

学术文献翻译模型,支持多种主流文档格式。

立即体验